Cost-effective watermark based detector for replay attacks on cyber-physical systems

Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may cause catastrophic effects on such systems. Due to the events of Stuxnet, replay attacks have gained increasing attention in recent years. To counter for the replay attacks, it has been proposed to impose additional watermarking signals to nominal control inputs. However, such detector may result in the waste of control cost especially when the attack is absent. In this paper, we firstly formulate an attack duration model for the replay attack. By exploiting the attack model, we propose a periodic watermarking strategy which aims to reduce the costs while guaranteeing the detection performance. Furthermore, we obtain an optimal periodic watermarking strategy for the approximated detection performance. Extensive simulations over quadruple water tank are conducted to demonstrate the system performance.

[1]  Terry L King A Guide to Chi-Squared Testing , 1997 .

[2]  Ralph Langner To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .

[3]  Panganamala Ramana Kumar,et al.  Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[4]  Ling Shi,et al.  Optimal Periodic Sensor Schedule for Steady-State Estimation Under Average Transmission Energy Constraint , 2013, IEEE Transactions on Automatic Control.

[5]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[6]  S. Sastry,et al.  Optimal control with unreliable communication: the TCP case , 2005, Proceedings of the 2005, American Control Conference, 2005..

[7]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  Ling Shi,et al.  Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems , 2017, IEEE Trans. Control. Netw. Syst..

[9]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[10]  L. Scharf,et al.  Statistical Signal Processing: Detection, Estimation, and Time Series Analysis , 1991 .

[11]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[12]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[13]  Panganamala Ramana Kumar,et al.  Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[14]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[15]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[16]  Albert Forment Navarro,et al.  Security analysis of a wireless quadruple tank control system , 2011 .

[17]  Jing Sun,et al.  Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .

[18]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[19]  Phillipp Meister,et al.  Statistical Signal Processing Detection Estimation And Time Series Analysis , 2016 .